Swift binary that utilizes Open Directory in order to perform passwords changes for a specified local administrator. The password is randomly generated and can be configured with your own settings.…
The Apple Deployment and Management exam doesn’t test you on the learning objectives covered in this tutorial. Link: https://it-training.apple.com/tutorials/deployment/sec020
Security: Signed packages, profiles, and configurations help ensure the authenticity and integrity of the contents. When an item is signed using a digital certificate, it creates a unique digital signature.…
This script: An Apple script to check the 256 hash value, 512 hash value, and developer id, from a macintosh software folder named Ed_Software filled with software on the users…
Rich Trouton documents how to create a configuration profile with an encrypted payload Link: https://derflounder.wordpress.com/2019/09/16/creating-macos-configuration-profiles-with-encrypted-payloads/
In a future update to iOS 16, iPadOS 16.1, and macOS 13, Apple will add a mechanism for shipping security fixes to users more frequently. These responses are included in…
This link contains instructions for how to set preferences for Microsoft Defender for Endpoint on macOS in enterprise organizations. To configure Microsoft Defender for Endpoint on macOS using the command-line…
This (link to) article explains the recommended security settings for Jamf Pro servers hosted on Jamf Cloud and on-premise. You must ensure that the Jamf Pro server and all supporting…
Jamf Threat Labs team created Aftermath, a Swift-based, open-source incident response framework tailor-made for macOS. After a security incident has occurred, rapid collection can take place with Aftermath running a…